Oleksandr Shneyder
634671db11
channel: Add ssh_channel_accept_forward().
...
This works same way as ssh_forward_accept() but can return a destination
port of the channel (useful if SSH connection forwarding several TCP/IP
ports).
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2014-01-16 09:13:57 +01:00
Aris Adamantiadis
1f689261ec
threads: support libgcrypt 1.6 hack
...
Not 100% satisfied of this patch, but the way libgcrypt handles
threading in 1.6 is not compatible with custom handlers. The
new code basicaly uses pthreads in every case. This will probably
not work on windows.
2014-01-08 22:06:38 +01:00
Andreas Schneider
4919771f0f
ChangeLog: Set release date.
libssh-0.6.0
2014-01-08 11:17:12 +01:00
Andreas Schneider
8aad24c062
include: Remove warning cause VSC doesn't know about it.
2014-01-08 10:55:39 +01:00
Andreas Schneider
0e5510bb99
include: Fix building if we do not have asm volatile.
2014-01-08 10:52:57 +01:00
Andreas Schneider
de464cb74e
src: Update my mail address.
2014-01-07 16:09:04 +01:00
Andreas Schneider
c41f32bcca
cmake: Remove unused macro modules.
2014-01-07 16:09:02 +01:00
Aris Adamantiadis
61e701caaa
update copyright information
2014-01-07 15:18:44 +01:00
Aris Adamantiadis
1c36642fed
tests: avoid reading uninitialized bytes
2014-01-07 14:43:01 +01:00
Aris Adamantiadis
ad287371fb
pki: fix gcrypt signature process
2014-01-07 14:21:15 +01:00
Andreas Schneider
ebfdfd9a14
examples: Make sure buffer is initialized.
2014-01-07 09:19:30 +01:00
Andreas Schneider
c9a1be5a85
example: Add missing include for forkpty().
2014-01-07 09:04:06 +01:00
Aris Adamantiadis
fc0db4d982
test: fixed torture_auth_none condition
2014-01-06 22:10:23 +01:00
Aris Adamantiadis
8f1a350b6e
test: test case for async auth_none
...
This test currently fails
2014-01-06 16:52:35 +01:00
Aris Adamantiadis
15ed51cf20
tests: auth_agent_nonblocking should run in nonblocking
2014-01-06 16:52:35 +01:00
Andreas Schneider
7b2e07ecbc
session: Fix a possible memory leak.
2014-01-06 16:18:06 +01:00
Aris Adamantiadis
0404d45c29
poll: fix poll_handles ownerships
2014-01-06 16:18:06 +01:00
Aris Adamantiadis
f2215d14de
socket: don't attempt reading a non-connected socket
2014-01-06 16:18:06 +01:00
Aris Adamantiadis
ebbf7988b9
tests: use LC_LIBSSH instead of LANG for env tests.
...
LANG is stripped and replaced on many distros and LC_* is accepted
by default on debian
2014-01-06 16:17:38 +01:00
Andreas Schneider
ec307d9862
examples: Fix building samplesshd-tty on FreeBSD.
2013-12-26 16:38:38 +01:00
Andreas Schneider
2068973ff3
poll: Correctly free ssh_event_fd_wrapper.
...
This is allocated by ssh_event_add_fd.
2013-12-22 22:26:51 +01:00
Andreas Schneider
6eea08a9ef
config: Support expansion in the Host variable too.
...
BUG: https://red.libssh.org/issues/127
2013-12-21 14:37:55 +01:00
Andreas Schneider
3ba2e7ace7
tests: Fix non-blocking auth tests.
...
The ssh_userauth_none() call should already be non-blocking. However
this this function is broken in non-blocking mode. It should reveal the
existing bug.
2013-12-15 21:04:46 +01:00
Andreas Schneider
15c64b2981
tests: Use new auth API in the torture_session test.
2013-12-15 20:30:48 +01:00
Andreas Schneider
ce5d421753
tests: Use new auth API in the torture_auth test.
2013-12-15 20:26:59 +01:00
Andreas Schneider
fd77439a12
tests: Fix pki test with gcrypt.
2013-12-11 21:12:12 +01:00
Jon Simons
a633deb985
channel: fix setting of channel->flags
...
Fix the setting of 'channel->flags' to use '|='. Before this
change, one bug symptom can be that channels are never fully
free'd via ssh_channel_free, resulting in memory leaks.
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-12-11 21:03:45 +01:00
Jon Simons
50b9a182f5
client: use ssh_channel_do_free in ssh_disconnect
...
Ensure to use 'ssh_channel_do_free' in 'ssh_disconnect', when removing and
free'ing up a session's channels. This matches the behavior in 'ssh_free',
and is necessary to fully free any channel which may not have been closed
completely (see usage of flags SSH_CHANNEL_FLAG_CLOSED_REMOTE,
SSH_CHANNEL_FLAG_FREED_LOCAL).
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-12-11 21:03:43 +01:00
Andreas Schneider
bb88b637a9
bind: Correctly free all memory in ssh_bind_free().
...
Thanks to Jacob Baines.
2013-12-09 19:50:52 +01:00
Jon Simons
60d5824760
session: Add ssh_get_clientbanner().
2013-12-07 16:24:53 +01:00
Andreas Schneider
397be918cd
channels: Add a ssh_channel_read_timeout function.
2013-12-04 20:34:52 +01:00
Andreas Schneider
880fdb4b52
tests: Try to fix torture_forward.
2013-12-04 16:27:19 +01:00
Andreas Schneider
6a74677cef
tests: Fix memory leaks.
2013-12-04 16:27:18 +01:00
Andreas Schneider
2c66eeaf75
pki: Fix a memory leak.
...
CID #1132819
2013-11-28 11:44:34 +01:00
Andreas Schneider
91edc0ee21
tests: Add torture_pki_write_privkey_ecdsa test.
2013-11-27 22:54:40 +01:00
Andreas Schneider
46bda45d95
tests: Add torture_pki_write_privkey_dsa test.
2013-11-27 22:54:40 +01:00
Andreas Schneider
9773c0852a
tests: Add torture_pki_write_privkey_rsa test.
2013-11-27 22:54:40 +01:00
Andreas Schneider
f1c56e4309
pki: Add ssh_pki_import_privkey_file().
2013-11-27 22:54:40 +01:00
Andreas Schneider
1fdc1025a8
pki_crypto: Add pki_private_key_to_pem().
2013-11-27 22:54:40 +01:00
Andreas Schneider
a375b6c996
pki_gcrypt: Add pki_private_key_to_pem() stub.
2013-11-27 22:54:40 +01:00
Andreas Schneider
ecb01e05a2
curve25519: Fix memory leaks in ssh_server_curve25519_init().
...
CID #1125255
2013-11-27 22:53:53 +01:00
Andreas Schneider
b3911d0fa2
curve25519: Do not leak q_s_string.
...
CID #1125256
2013-11-27 22:53:53 +01:00
Andreas Schneider
1ee687ea6f
curve25519: Fix a memory leak.
...
CID #1125257
2013-11-27 22:53:53 +01:00
Andreas Schneider
73e1f2691f
examples: Fix else branch.
...
CID #1127816
2013-11-27 22:53:53 +01:00
Andreas Schneider
84e29f9c06
packet: Remove logically dead code.
...
CID #1128796
2013-11-27 22:53:53 +01:00
Andreas Schneider
23837b2080
tests: Try to fix valgrind warnings.
2013-11-27 22:53:53 +01:00
Andreas Schneider
4884f1d6fc
tests: Fix a valgrind warning.
2013-11-27 22:53:53 +01:00
Andreas Schneider
ead1c4b168
ecdh: Check if we have ECC support.
2013-11-27 22:53:53 +01:00
Andreas Schneider
3e11cb8071
ecdh: Use bignum_bin2bn.
2013-11-27 22:53:48 +01:00
Nicolas Viennot
78e78642e7
server: Add a ssh_send_keepalive() function.
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-11-24 23:21:39 +01:00